General
-
Target
1156c98665e062aeca7e6a3959674e23916d713fc6bd22a343c4add8833906f8
-
Size
432KB
-
Sample
241105-2gf5ysyre1
-
MD5
85afaab719e51813bfd6d5260f6cdb61
-
SHA1
e1359badb973b0f25093c64948042f7caf42aab4
-
SHA256
1156c98665e062aeca7e6a3959674e23916d713fc6bd22a343c4add8833906f8
-
SHA512
ef312cdd62269afcda4f999910d3394dfb63e5cc2b53bb7a76d41161d9b8db588b94a1ce221449a5b29a253a4662da6c583f971a78470a618caf27182c012f11
-
SSDEEP
6144:00MyN90RrmR2ERjInnJKtaukONY2SEanSNdxm2HIbMgo8dEDsjxwQXEXohq:0ly90VmPRjk6aULm2/go0wsj6QpU
Static task
static1
Behavioral task
behavioral1
Sample
0f32c4e03dee398b88d368404c6b56c4d834accc5f75aaea9f4a58c85e86ac7a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
redline
fukia
193.233.20.13:4136
-
auth_value
e5783636fbd9e4f0cf9a017bce02e67e
Targets
-
-
Target
0f32c4e03dee398b88d368404c6b56c4d834accc5f75aaea9f4a58c85e86ac7a
-
Size
484KB
-
MD5
566e9f86b0ac2db7c021ebb0e125e19f
-
SHA1
280effafc52b100099ea3445be1c4de511b7187d
-
SHA256
0f32c4e03dee398b88d368404c6b56c4d834accc5f75aaea9f4a58c85e86ac7a
-
SHA512
5eab1fa015c420ae68a9579e421a2cf3f9fd59eae5dfd49e8433e77d9615ccea17792da4d02d5fb89728c7f02b28dce605df7d224a5da488c5b21211d5712b95
-
SSDEEP
6144:KBy+bnr++p0yN90QER52ER/Ita3ZraukOjY2SEanSNdx02HSbMgo4dEDsjxKJ74M:/MrGy90LR/goZvaUL02tgo4wsjoJ7t1
-
Detects Healer an antivirus disabler dropper
-
Healer family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1